Abstract

Internet of Things (IoT) facilitates the integration between objects and different sensors to provide communication among them without human intervention. However, the extensive demand for IoT and its various applications has continued to grow, coupled with the need to achieve foolproof security requirements. IoT produces a vast amount of data under several constraints such as low processor, power, and memory. These constraints, along with the invaluable data produced by IoT devices, make IoT vulnerable to various security attacks. This paper presents an overview of IoT, its well-known system architecture, enabling technologies, and discusses security challenges and goals. Furthermore, we analyze security vulnerabilities and provide state-of-the-art security taxonomy. The taxonomy of the most relevant and current IoT security attacks is presented for application, network, and physical layers. While most other surveys studied one of the areas of security measures, this study considers and reports on the most advanced security countermeasures within the areas of autonomic, encryption, and learning-based approaches. Additionally, we uncover security challenges that may be met by the research community regarding security implementation in heterogeneous IoT environment. Finally, we provide different visions about possible security solutions and future research directions.

Highlights

  • Internet of Things (IoT) generally refers to a world of networked smart objects, where every physical “thing” which has a digital element is interconnected

  • We provide an extensive taxonomy of security attacks based on a three-layered IoT architecture

  • In this paper, we have studied and presented an overview of IoT, its enabling technologies, and compared the factors related to implementing a comprehensive security approach in IoT with traditional internet

Read more

Summary

Introduction

Internet of Things (IoT) generally refers to a world of networked smart objects, where every physical “thing” which has a digital element is interconnected. IoT enables the interconnectivity of billions of devices to aid computing and communications. Digital entities such as sensors, Radio-Frequency Identification (RFID), internet and localization technology make it possible to transform everyday objects into smart objects which are capable of interpreting and interacting with each other [2]. The embedded sensors in smart objects monitor, sense, and collect different kinds of data about equipment, environment, and human social life [3]. No matter how well-designed, intelligently configured, efficiently implemented and properly maintained a security system is, it will have to rely on human intervention and is not immune to security threats. Technological developments have further enhanced security solutions and made them fully protected in many cases, there is still an ongoing need for security solutions to evolve and develop in order to overcome new security challenges [5]

Methods
Findings
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call